1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

MS Security Update TODAY

Discussion in 'Windows XP' started by Steve R Jones, 2006/01/05.

  1. 2006/01/05
    Steve R Jones

    Steve R Jones SuperGeek Staff Thread Starter

    Joined:
    2001/12/30
    Messages:
    12,317
    Likes Received:
    252
    Important Information for Thursday 5 January 2006

    Microsoft announced that it would release a security update to help
    protect customers from exploitations of a vulnerability in the
    Windows Meta File (WMF) area of code in the Windows operating system on Tuesday, January 2, 2006, in response to malicious and criminal attacks on computer users that were discovered last week.

    Microsoft will release the update today on Thursday, January 5, 2006, earlier than planned.

    Microsoft originally planned to release the update on Tuesday,
    January 10, 2006 as part of its regular monthly release of security
    bulletins, once testing for quality and application compatibility
    was complete. However, testing has been completed earlier than
    anticipated and the update is ready for release.

    In addition, Microsoft is releasing the update early in response to
    strong customer sentiment that the release should be made available as soon as possible.

    Microsoft's monitoring of attack data continues to indicate that the
    attacks are limited and are being mitigated both by Microsoft's
    efforts to shut down malicious Web sites and with up-to-date
    signatures form anti-virus companies.

    The security update will be available at 2:00 pm PT as MS06-001.
     
  2. 2006/01/05
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389

  3. to hide this advert.

  4. 2006/01/05
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
  5. 2006/01/05
    Christer

    Christer Geek Member Staff

    Joined:
    2002/12/17
    Messages:
    6,585
    Likes Received:
    74
    Steve,
    thanks for the heads up!

    Downloaded, installed and archived!

    Christer
     
  6. 2006/01/05
    balo

    balo Inactive

    Joined:
    2004/06/01
    Messages:
    73
    Likes Received:
    0
    Just remember to uninstall the previous temporary fixes.
     
    balo,
    #5
  7. 2006/01/06
    captjlddavis

    captjlddavis Well-Known Member

    Joined:
    2002/09/13
    Messages:
    588
    Likes Received:
    3
    OK.

    I Downloaded:
    WindowsXP-KB912919-x86-ENU.exe
    from:
    http://www.microsoft.com/technet/security/Bulletin/ms06-001.mspx

    After much trepidation I installed it....(just don't have alot of faith in M$)

    Ran the Vulnaribility test "wmf_checker_hexblog.exe" and came up clean ?

    Looking in Add/Remove programs, I don't see an entry for the HOTFIX. I also see several SP2 fixes ( I don't recall ever applying SP2) My Computer - properties shows "XP HOME Version 2002 - Service Pack 1 - Did BG get me again ?
    or am I missing something ?

    regards:captjlddavis
     
    Last edited: 2006/01/06
  8. 2006/01/06
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    captjlddavis

    I see that you are not running SP2 and do rather wonder why not? :)

    Any hotfixes issued since SP1 are designated SP2 and are included in SP2. You should see the hotfix in Add/Remove programs - at least you do in an SP2 installation as long as the checkbox 'Show Updates' is checked. I do not think that the check box was included in SP1 and the updates were shown by default.

    To check which hotfixes are installed enable Show Hidden Files and Folders in Windows Explorer and go to C:\Windows where you will see the uninstall files (generally in blue) for those hotfixes which can be uninstalled - not all can.

    Another way is to use the Windows Hotfix Check - Qfecheck.exe
     
  9. 2006/01/06
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    Yes, you can use Ilfak Guilfanov's "wmf_checker_hexblog.exe" to check and see if either his, or Microsoft's new, WMF Vulnerability patch has actually worked. If you are patched, you'll get a little window that states:
    No vulnerability has been detected

    Your system seems to be invulnerable to the WMF exploit.

    Please note that this program tries only one WMF exploit.
    In theory other vulnerabilities and exploits are possible,
    so stay vigilant and update your system frequently!​
    Only if you've installed Ilfak Guilfanov's "wmffix_hexblog13.exe ", (where that "13" can be any version number), will you then see the "Windows WMF Metafile Vulnerability HotFix" in Add/Remove Programs.
    To see if Microsoft's WMF exploit patch (KB912919) has been applied, in Add/Remove Programs (on XP), place a checkmark in the little box to the left of "Show Updates" then select "Date Last Use" in the "Sort by:" box to the right of that. Now down near the bottom of the list somewhere you should see:
    Security Update for Windows XP (KB912919) - Installed on 01/05/2006​
    FWIW, the prior two updates I received here, (auto-update On, Windows XP Professional, fully patched), were:
    Update for Windows XP (KB910437) - Installed on 12/14/2005
    Security Update for Windows XP (KB905915) - Installed on 12/14/2005​
    You can also go to http://windowsupdate.microsoft.com , click the "Review your update history" in the left column, then, if necessary, click the "Date" column header on the right once or twice in order to get the dates sorted in descending order. The topmost update should now read, (horizontally though):
    Product: Windows XP
    Update: Security Update for Windows XP (KB912919)
    Status: (A white checkmark on a little green dot)
    Date: Thursday, January 05, 2006
    Source: Automatic Updates ​
    Note: My "Source:" reads "Automatic Updates ". Yours may read "Microsoft Update website ". Depends on how you applied the Update.
     
  10. 2006/01/06
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    Correct. If you:
    1. ran the command:
      regsvr32 -u shimgvw.dll​
      you now need to click Start | Run, type in:
      regsvr32 shimgvw.dll​
      and press [Enter] (or click OK). If successful, you get a little box that states:
    2. installed Ilfak Guilfanov's "wmffix_hexblog13.exe ", (where that "13" can be any version number), you need to remove the
      Windows WMF Metafile Vulnerability HotFix​
      in Add/Remove Programs.

      (Note that you can remove Ilfak's WMF hotfix either before or after installing Microsoft's KB912919 update).
     
  11. 2006/01/06
    PeteC

    PeteC SuperGeek Staff

    Joined:
    2002/05/10
    Messages:
    28,896
    Likes Received:
    389
    SpywareDr
    I don't think this was a feature of SP1 - please correct me if I am mistaken here - SP1 was a long time ago :) and captjlddavis is on SP1.
     
  12. 2006/01/06
    SpywareDr

    SpywareDr SuperGeek WindowsBBS Team Member

    Joined:
    2005/12/31
    Messages:
    3,752
    Likes Received:
    338
    Hmmm... you could well be right. Don't remember at the moment. (Not enough coffee yet this morning a-n-d, getting old :))

    If that's the case though, he should still be able to follow my instructions (above) for retrieving the same info from http://windowsupdate.microsoft.com
     
  13. 2006/01/06
    captjlddavis

    captjlddavis Well-Known Member

    Joined:
    2002/09/13
    Messages:
    588
    Likes Received:
    3
    Thanks to all the replied.
    Using various described methods - It looks like It was/is applied and running.

    Thanks again

    regards:captjlddavis
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.